LOS ANGELES (AP) — A U.S. firm that helps connect more than 700 companies with customers through social media says a Syrian group hacked the company's web address to upload a message to other websites.
By Peter Apps WASHINGTON (Reuters) - When Russians crossed the border to fight with rebels in eastern Ukraine earlier this year, Moscow said the soldiers had not been deployed but had gone on their own vacation time. When Estonia was the victim of a cyber attack in 2007 and blamed Moscow, the Kremlin responded that it could not always control patriotic Russian hackers. ...
U.S. and U.K. spy agencies including the NSA and GCHQ, respectively, have performed a variety of sophisticated spy operations, collecting massive amounts of personal data, as many Edward Snowden leaks revealed in the past year. German publication Süddeutsche Zeitung has published a new report that reveals that as far back as 2009 the GCHQ, and thus also the NSA, had massive access to submarine cable links around the globe with help from now Vodafone-owned Cable & Wireless. FROM EARLIER: The most advanced malware yet has been spying on you for years “A joint investigation by NDR, WDR, Süddeutsche Zeitung and Channel 4 based on documents leaked by whistleblower Edward Snowden, reveals that Cable & Wireless actively shaped and provided the
By Teppei Kasai TOKYO (Reuters) - U.S. bitcoin exchange operator Payward Inc said on Wednesday it will work on retrieving some millions of dollars lost by Tokyo-based Mt. Gox, once the world's largest bitcoin exchange before it collapsed in bankruptcy this year. Kraken, Payward's bitcoin exchange, will assist Mt. Gox's Tokyo-court appointed trustee Nobuaki Kobayashi with investigating where the missing bitcoins are, along with eventually redistributing any found to creditors as part of a liquidation. The partnership between Payward and Mt. ...
(Reuters) - Sony Pictures Entertainment said its computer system was down for a second day on Tuesday, following media reports of a major hacking attack aimed at the film and television studio. Before Sony Pictures' computers went dark on Monday, the screens displayed an image of a red skeleton with the phrase "Hacked By #GOP," according to the Los Angeles Times. The hackers warned the unit of Sony Corp that they had obtained "secrets" that they would leak on the Web, the newspaper reported. "We've already warned you, and this is just a beginning. ...
Back at the start of the year after Samsung unveiled the Galaxy S5, I suggested that smartphone fans might be in for another boring year in 2014. In some ways, 2014 was boring; we really didn’t see anything that introduced truly novel or revolutionary new features added to smartphones this year. But phones still progressed in 2014, growing faster, sleeker and more powerful than they have ever been before, and there were some terrific phones that launched this year. As we move into the holiday shopping season, here are the five best high-end smartphones you can buy. Motorola Droid Turbo Among the five smartphones on this list, Motorola’s Droid Turbo is the youngest. It is also the most impressive on
Home Depot faces at least 44 lawsuits in the United States and Canada over a massive data breach earlier this year that affected 56 million debit and credit cards.
Security researchers have discovered a highly advanced malware program, called Regin, that have been used for spying purposes for at least six years. First discovered by Symantec and confirmed by Kaspersky, the security threat is believed to be the work of a government, considering the massive resources behind it and its sophisticated features, rather than a program devised by hacker groups interested in stealing data and/or money from regular Internet users. FROM EARLIER: ‘Dirtbox’ planes masquerade as cell towers to collect smartphone data in sophisticated spying ops “An advanced spying tool, Regin displays a degree of technical competence rarely seen and has been used in spying operations against governments, infrastructure operators, businesses, researchers, and private individuals,” Symantec writes. “It is
Your daily look at late-breaking news, upcoming events and the stories that will be talked about Tuesday:
If you thought hackers gaining access to just one of your online accounts was troublesome, you’ll be terrified to know that the next frontier might put your entire online identity at risk. IBM’s Security Intelligence reports that a new configuration of the Citadel trojan has been designed to start keylogging when specific password managers begin running on an infected user’s computer. FROM EARLIER: Scary new malware uses a Gmail trick to steal your data “Because the configuration file instructs the malware to capture keystrokes related to widely used password management and authentication solutions, we can’t know who, exactly, is the target of the attack,” writes IBM. “It might be an opportunistic attack, where the attackers are trying to see which type of
• Unidentified country likely behind spying software (Nov 28, 2014)
• Automakers aim to drive away car computer hackers (Nov 28, 2014)
• Fort Drum powered by wood in renewable energy push (Nov 28, 2014)
• Computer spying malware uncovered with 'stealth' features: Symantec (Nov 28, 2014)
• NYC man gets prison for role in cybercrime ring (Nov 28, 2014)
• Here’s who is tracking your smartphone – and how to stop them (Nov 28, 2014)
• Brooklyn man sentenced for role in cybercrime ring (Nov 28, 2014)
• Latest Google Maps update brings awesome new features to Android (Nov 28, 2014)
• U.S. accuses China of cyber spying on American companies (Nov 28, 2014)
• U.S. Congress urged to consider sanctions on Chinese cyber-spies (Nov 28, 2014)
• Critics storm Poland's electoral body over delays (Nov 28, 2014)
• NSA director: China can damage US power grid (Nov 28, 2014)
• FTC cracks down on massive ‘PC cleaner’ security scam (Nov 28, 2014)
• Sephora discriminated against Asian customers, lawsuit claims (Nov 28, 2014)